First published: Wed Jan 27 2021(Updated: )
Monitorix 3.13.0 allows remote attackers to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that some exiting installations became unsafe, upon an update to 3.13.0, unless the new feature was immediately configured.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
fibranet Monitorix | =3.13.0 | |
Fedora | =32 | |
Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3325 is classified as a medium severity vulnerability due to its ability to bypass Basic Authentication.
To fix CVE-2021-3325, upgrade Monitorix to version 3.13.1 or later, which addresses the authentication bypass issue.
CVE-2021-3325 affects Monitorix version 3.13.0 and certain installations of Fedora 32 and 33.
Yes, CVE-2021-3325 can be exploited by remote attackers who can bypass Basic Authentication.
Yes, CVE-2021-3325 arises from a misconfiguration in installations that lack a hosts_deny option.